An Encryption Traffic Analysis Countermeasure Model Based on Game Theory

With the development of network technologies, the proportion of encrypted traffic in cyberspace is increasing. This phenomenon directly leads to the increasingly challenging management and control of network traffic. The research on encrypted traffic analysis and monitoring at this stage has become an important direction. Based on game theory, this paper proposes a countermeasure model in the detection of encrypted traffic and expounds the key elements of the model. Finally, we will present a detailed analysis of the pay and benefits between the two sides of the game.

[1]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[2]  T. Basar,et al.  A game theoretic analysis of intrusion detection in access control systems , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[3]  Lawrence Carin,et al.  Cybersecurity Strategies: The QuERIES Methodology , 2008, Computer.

[4]  Peng Liu,et al.  Incentive-based modeling and inference of attacker intent, objectives, and strategies , 2005, ACM Trans. Inf. Syst. Secur..

[5]  Chuanyi Ji,et al.  Modeling and defending against internet worm attacks , 2007 .

[6]  Zhouguo Chen,et al.  The Random Forest Based Detection of Shadowsock's Traffic , 2017, 2017 9th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).

[7]  Jean Goubault-Larrecq,et al.  A Logical Framework for Evaluating Network Resilience Against Faults and Attacks , 2007, ASIAN.

[8]  Andrew M. White Practical analysis of encrypted network traffic , 2015 .

[9]  Blake Anderson,et al.  Identifying Encrypted Malware Traffic with Contextual Flow Data , 2016, AISec@CCS.

[10]  Blake Anderson,et al.  Machine Learning for Encrypted Malware Traffic Classification: Accounting for Noisy Labels and Non-Stationarity , 2017, KDD.

[11]  T. Basar,et al.  Intrusion Response as a Resource Allocation Problem , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[12]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[13]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[14]  Dong Zhou,et al.  Translation techniques in cross-language information retrieval , 2012, CSUR.

[15]  Jun Xu,et al.  Sustaining Availability of Web Services under Distributed Denial of Service Attacks , 2003, IEEE Trans. Computers.

[16]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[17]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[18]  Philip Mirowski What Were von Neumann and Morgenstern Trying to Accomplish , 1992 .

[19]  Mahdi Jafari Siavoshani,et al.  Deep packet: a novel approach for encrypted traffic classification using deep learning , 2017, Soft Computing.

[20]  Eugene Spafford CERIAS Tech Report 2005-137 Report to the President on Cyber Security: A Crisis of Prioritization , 2005 .